Skip to main content

🛡️ AWS RDS Cluster Event Subscription for critical events is not configured🟢

  • Contextual name: 🛡️ Cluster Event Subscription for critical events is not configured🟢
  • ID: /ce/ca/aws/rds/cluster-event-subscription
  • Tags:
  • Policy Type: COMPLIANCE_POLICY
  • Policy Categories: RELIABILITY

Logic

Similar Policies

Description

Open File

Description

This control evaluates whether there is an AWS RDS Event Subscription that is configured to send notifications for the following source type and event categories:

  • Source type: db-cluster
  • Event categories: maintenance, failure

Amazon RDS event notifications use Amazon SNS to inform you of changes to the availability or configuration of RDS resources, enabling timely operational awareness.

Rationale

Maintenance and failure events may indicate changes that directly impact the availability or configuration of DB clusters. Critical events, such as a primary instance failure, require immediate attention to maintain application availability and data integrity. Without appropriate event subscriptions, operational teams may not be alerted to these conditions in a timely manner, increasing the risk of prolonged service disruptions.

Audit

This policy flags an AWS Account as INCOMPLIANT if no Amazon RDS Event Subscriptions are configured to notify on maintenance and failure events for the db-cluster source type.

... see more

Remediation

Open File

Remediation

Create an RDS Event Subscription

Configure Amazon RDS event subscriptions to receive notifications for maintenance and failure events for DB clusters.

From Console
  1. Sign in to the AWS Management Console.

  2. Navigate to the Amazon RDS console.

  3. In the navigation pane, under Amazon RDS, select Event subscriptions.

  4. Choose Create event subscription.

  5. On the Create event subscription page, configure the following settings:

    • Enter a unique name in the Name field.

    Target Section

    • For Send notifications to, choose one of the following:

      • Create a new Amazon SNS topic. Provide a unique Topic name and specify the email address(es) to receive notifications.
      • Select an existing Amazon SNS topic by choosing its ARN from the list.

    Source Section

    • Set Source type to Clusters.
    • For Clusters to include, select All clusters.
    • For Event categories to include, select Select specific event categories and choose maintenance and failure.

... see more

policy.yaml

Open File

Linked Framework Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [RDS.19] Existing RDS event notification subscriptions should be configured for critical cluster events1no data
💼 Cloudaware Framework → 💼 System Configuration69no data
💼 FedRAMP High Security Controls → 💼 CA-7 Continuous Monitoring (L)(M)(H)227no data
💼 FedRAMP High Security Controls → 💼 SI-2 Flaw Remediation (L)(M)(H)2723no data
💼 FedRAMP Low Security Controls → 💼 CA-7 Continuous Monitoring (L)(M)(H)127no data
💼 FedRAMP Low Security Controls → 💼 SI-2 Flaw Remediation (L)(M)(H)23no data
💼 FedRAMP Moderate Security Controls → 💼 CA-7 Continuous Monitoring (L)(M)(H)227no data
💼 FedRAMP Moderate Security Controls → 💼 SI-2 Flaw Remediation (L)(M)(H)223no data
💼 NIST CSF v2.0 → 💼 DE.AE-02: Potentially adverse events are analyzed to better understand associated activities50no data
💼 NIST CSF v2.0 → 💼 DE.AE-03: Information is correlated from multiple sources65no data
💼 NIST CSF v2.0 → 💼 DE.CM-01: Networks and network services are monitored to find potentially adverse events180no data
💼 NIST CSF v2.0 → 💼 DE.CM-02: The physical environment is monitored to find potentially adverse events27no data
💼 NIST CSF v2.0 → 💼 DE.CM-03: Personnel activity and technology usage are monitored to find potentially adverse events100no data
💼 NIST CSF v2.0 → 💼 DE.CM-06: External service provider activities and services are monitored to find potentially adverse events50no data
💼 NIST CSF v2.0 → 💼 DE.CM-09: Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events181no data
💼 NIST CSF v2.0 → 💼 ID.IM-01: Improvements are identified from evaluations45no data
💼 NIST CSF v2.0 → 💼 ID.IM-02: Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties59no data
💼 NIST CSF v2.0 → 💼 ID.IM-03: Improvements are identified from execution of operational processes, procedures, and activities60no data
💼 NIST CSF v2.0 → 💼 ID.RA-01: Vulnerabilities in assets are identified, validated, and recorded46no data
💼 NIST CSF v2.0 → 💼 ID.RA-07: Changes and exceptions are managed, assessed for risk impact, recorded, and tracked49no data
💼 NIST SP 800-53 Revision 5 → 💼 CA-7 Continuous Monitoring627no data
💼 NIST SP 800-53 Revision 5 → 💼 SI-2 Flaw Remediation6620no data